{"id":2460,"date":"2013-05-02T00:00:00","date_gmt":"2013-05-02T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/05\/02\/dhs-opusa-may-be-more-bark-than-bite\/"},"modified":"2021-12-30T11:41:22","modified_gmt":"2021-12-30T11:41:22","slug":"dhs-opusa-may-be-more-bark-than-bite","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/05\/02\/dhs-opusa-may-be-more-bark-than-bite\/","title":{"rendered":"DHS: \u2018OpUSA\u2019 May Be More Bark Than Bite"},"content":{"rendered":"<p>Department of Homeland Security is warning that a group of mostly Middle East- and North Africa-based criminal hackers are preparing to launch a cyber attack campaign next week known as \u201cOpUSA\u201d against websites of high-profile US government agencies, financial institutions, and commercial entities. A confidential alert, produced by DHS on May 1 and obtained by KrebsOnSecurity, predicts that the attacks \u201clikely will result in limited disruptions and mostly consist of nuisance-level attacks against publicly accessible webpages and possibly data exploitation.<\/p>\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The DHS alert is in response to chest-thumping declarations from anonymous hackers who have promised to team up and launch a volley of online attacks against a range of U.S. targets beginning May 7.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">But Rodney Joffe, senior vice president at Sterling, Va. based security and intelligence firm Neustar, said all bets are off if the campaign is joined by the likes of the Izz ad-Din al-Qassam Cyber Fighters, a hacker group that has been disrupting consumer-facing Web sites for U.S. financial institutions since last fall.&nbsp;&nbsp;Joffe said it\u2019s easy to dismiss a hacker manifesto full of swear words and leetspeak as the ramblings of script kiddies and impressionable, wannabe hackers who are just begging for attention.&nbsp;&nbsp;\u201cThe damage they\u2019re capable of doing may be out of proportion with their skills, but that\u2019s been going on for seven months and it\u2019s been brutally damaging.\u201d<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">What\u2019s more, the DHS warning comes just days after the FBI issued a flash alert on Brobot (PDF) warning that hackers have been modifying the attack scripts to ensure they can evade their targets\u2019 mitigation efforts. \u201cBecause the attacks have been ongoing for seven months, the actors are changing their attack methodology to circumvent mitigation efforts of the financial institutions,\u201d reads an FBI alert obtained by BankInfoSecurity.com. \u201cThe latest version of the \u2018Brobot\u2019 attack scripts that have been utilized to attack the login capabilities of a financial institution\u2019s website spoofs a fraudulent access cookie, user-agent string and referrer. The FBI alert notes that the hard-coded string does not affect the new attack script, but can be used as signatures for intrusion detection and intrusion prevention devices to detect and block attacks from the Brobot botnet.<\/p>\n<p>\nLink: <a href=\"http:\/\/m.krebsonsecurity.com\/2013\/05\/dhs-opusa-may-be-more-bark-than-bite\/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+SecurityBloggersNetwork+%28Security+Bloggers+Network%29\">http:\/\/m.krebsonsecurity.com\/2013\/05\/dhs-opusa-may-be-more-bark-than-bite\/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+SecurityBloggersNetwork+%28Security+Bloggers+Network%29<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-2460","post","type-post","status-publish","format-standard","hentry","category-warnings"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2460"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2460\/revisions"}],"predecessor-version":[{"id":4947,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2460\/revisions\/4947"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2460"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}